An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)
From MaRDI portal
Publication:4250756
DOI10.1007/3-540-48910-X_7zbMath0948.94008OpenAlexW1805062869MaRDI QIDQ4250756
Publication date: 5 October 1999
Published in: Advances in Cryptology — EUROCRYPT ’99 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-48910-x_7
public key cryptosystemadaptive chosen ciphertext attackdecisional Diffie-Hellman intractability assumptionthreshold decryption service
Related Items
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency ⋮ Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption ⋮ Adaptively secure distributed PRFs from LWE ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Adaptively secure threshold symmetric-key encryption ⋮ Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions ⋮ Electronic jury voting protocols ⋮ Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model ⋮ Threshold public key encryption scheme resilient against continual leakage without random oracles ⋮ CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts ⋮ Encapsulated search index: public-key, sub-linear, distributed, and delegatable ⋮ Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext ⋮ Efficient dynamic threshold identity-based encryption with constant-size ciphertext ⋮ Fuzzy asymmetric password-authenticated key exchange ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Provably secure threshold public-key encryption with adaptive security and short ciphertexts ⋮ Computational fuzzy extractors ⋮ Simplified Submission of Inputs to Protocols ⋮ A note on the security of KHL scheme ⋮ The reactive simulatability (RSIM) framework for asynchronous systems ⋮ Adaptively Secure Non-interactive Threshold Cryptosystems ⋮ Verifiable Elections That Scale for Free ⋮ Tag-KEM/DEM: A new framework for hybrid encryption ⋮ Efficient hybrid encryption from ID-based encryption ⋮ Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism ⋮ Protecting against key-exposure: strongly key-insulated encryption with optimal threshold ⋮ Extensions of access structures and their cryptographic applications ⋮ Fair Traceable Multi-Group Signatures ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Efficient Threshold Encryption from Lossy Trapdoor Functions ⋮ Chosen-Ciphertext Secure Proxy Re-encryption without Pairings ⋮ Adaptively secure distributed public-key systems. ⋮ Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts